Source |
Reversemode |
Identifiant |
8654597 |
Date de publication |
2023-10-20 17:13:53 (vue: 2025-03-07 20:12:10) |
Titre |
Quelques réflexions sur les vulnérabilités de vote électronique. Some thoughts on e-Voting vulnerabilities. |
Texte |
i \\ 'm a un peu surpris par le blog de Schneier d'aujourd'hui " |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
however i just 000 150 2022 3rd 800 ability about acknowledge actual actually adapt add additionally ago all almost already also analog and/or apparently applications approach approximately architecture are around article aspect assertions attack attacker attention audit auditability back bad based because been before being bit blog bounty break browser bug but bypass can certain challenging chancellery change changing claim claimed claims clients code codebase codebases codes commonplace community compare complex complexity component comprised computer conclusion conclusions conditions consider context continue continuing: correct corroborated criticism cryptographic custom day dedicated defined degree depict described description designed despite detailed write detailing deviate different difficult difficulties disagree distributed documentation documented: don due easier easy efforts either election end engineering entire even eventually everything evoting explained express external extrapolating facilitate files finding follow force formal formally from front full future general got guarantee guide happen has have highly hold honest however image implement implementation implemented independent reports individual infected infosec injecting instructions intended interactions introduced irremediably issue issues its java just know laid largest last leading leave legitimate levels like likely lines little locally long malicious malware many massive master matching maths may mentioned metrics minute modified modify most necessary new not note obviously one open operations opinion option order original ourselves out outcome over paid paper part parties parts party people periodically place in platform please point polling positive possibility post precautions present previous previously printed prioritizes problem process profoundly program properly protocol protocols provably provide public publicly published publishing quite really reasoning receive received refrain rendered report reported requesting required researching result reviewed reviewed some right risk run said scan schneier science security see seems short: should show showcased significant simply since situation situations size social some someone something source special specific statement: station story studied subsequent such support surprised surprisingly sustains swiss swisspost switzerland system task technologies terms the 1st them theoretical these think third thoroughly those thoughts through to today top transparency tricks trust try typescript under understand undertaking unpopular unsolvable upload ups for some of useless using usually vague vain validate verifiability verified victim view vote voter voters voting vulnerabilities vulnerability way webform website which which provide who whose will within world worst would wouldn year yet you your |
Tags |
Malware
Vulnerability
|
Stories |
|
Move |
|